Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CMIDs should hold key usage restrictions #1754

Open
bluegate010 opened this issue Oct 30, 2024 · 0 comments
Open

CMIDs should hold key usage restrictions #1754

bluegate010 opened this issue Oct 30, 2024 · 0 comments
Assignees

Comments

@bluegate010
Copy link
Contributor

https://github.com/chipsalliance/caliptra-sw/blob/main-2.x/runtime/README.md describes CMIDs, which hold metadata describing keys held in Caliptra. The metadata currently describes the key's location and size, but not its purpose. This could allow one key to be used for multiple purposes (like HMAC and AES, where AES will implicitly truncate keys to the correct size).

To resolve this, we can have CM_IMPORT, CM_HMAC_FINAL, CM_HKDF_EXPAND, and CM_ECDH_FINISH each take an input arg specifying the type of key being created.

swenson added a commit that referenced this issue Nov 15, 2024
Mostly.

We need to keep a limited amount of storage per AES-256-GCM key to track
usage, since these keys can only be used a certain number of times due
to their IV problems.

For HMAC, we don't specify a key usage on the output MAC, since it has
to be imported back into Caliptra to be used as a key, where its usage
will have to be specified.

We also fix a few other minor issues with the mailbox documentation:

Fixes #1753
Fixes #1754
Fixes #1755
Fixes #1756
swenson added a commit that referenced this issue Nov 15, 2024
Mostly.

We need to keep a limited amount of storage per AES-256-GCM key to track
usage, since these keys can only be used a certain number of times due
to their IV problems.

For HMAC, we don't specify a key usage on the output MAC, since it has
to be imported back into Caliptra to be used as a key, where its usage
will have to be specified.

We also fix a few other minor issues with the mailbox documentation:

Fixes #1753
Fixes #1754
Fixes #1755
Fixes #1756
swenson added a commit that referenced this issue Nov 20, 2024
Mostly.

We need to keep a limited amount of storage per AES-256-GCM key to track
usage, since these keys can only be used a certain number of times due
to their IV problems.

For HMAC, we don't specify a key usage on the output MAC, since it has
to be imported back into Caliptra to be used as a key, where its usage
will have to be specified.

We also fix a few other minor issues with the mailbox documentation:

Fixes #1753
Fixes #1754
Fixes #1755
Fixes #1756
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants